{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:07:24Z","timestamp":1763345244966,"version":"3.45.0"},"reference-count":20,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064728","type":"journal-article","created":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T08:55:43Z","timestamp":1754556943000},"page":"1899-1916","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling CyberFortis: A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer"],"prefix":"10.32604","volume":"85","author":[{"given":"Kuncham Sreenivasa","family":"Rao","sequence":"first","affiliation":[]},{"given":"Rajitha","family":"Kotoju","sequence":"additional","affiliation":[]},{"given":"B. Ramana","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"Taher","family":"Al-Shehari","sequence":"additional","affiliation":[]},{"given":"Nasser A.","family":"Alsadhan","sequence":"additional","affiliation":[]},{"given":"Subhav","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Shitharth","family":"Selvarajan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"20584","DOI":"10.1109\/ACCESS.2025.3535821","article-title":"End-to-end security mechanism using blockchain for Industrial Internet of Things","volume":"13","author":"Dildar","year":"2025","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10462-025-11113-0","article-title":"Review of filtering based feature selection for Botnet detection in the Internet of Things","volume":"58","author":"Saied","year":"2025","journal-title":"Artif Intell Rev"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"14002","DOI":"10.1109\/JIOT.2025.3526160","article-title":"Complicated imbalanced and overlapped data oversampling approach via hypersphere coverage and adaptive differential evolution for anomaly detection of Industrial Internet of Things","volume":"12","author":"Shang","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5217","DOI":"10.1109\/TII.2023.3333438","article-title":"Trees bootstrap aggregation for detection and characterization of IoT-SCADA network traffic","volume":"20","author":"Ahakonye","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10207-024-00951-8","article-title":"On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances","volume":"24","author":"Abdullahi","year":"2025","journal-title":"Int J Inf Secur"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/s10207-024-00916-x","article-title":"Using machine learning to detect network intrusions in industrial control systems: a survey","volume":"24","author":"Termanini","year":"2025","journal-title":"Int J Inf Secur"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"100676","DOI":"10.1016\/j.iot.2022.100676","article-title":"SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection","volume":"21","author":"Ahakonye","year":"2023","journal-title":"Internet Things"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/JSYST.2023.3270620","article-title":"Industrial Internet of Things: a review of improvements over traditional SCADA systems for industrial automation","volume":"18","author":"Babayigit","year":"2023","journal-title":"IEEE Syst J"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-024-04792-x","article-title":"LIRAD: lightweight tree-based approaches on resource-constrained IoT devices for attack detection","volume":"28","author":"Mishra","year":"2025","journal-title":"Clust Comput"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"39550","DOI":"10.1109\/JIOT.2024.3447876","article-title":"Attack detection using artificial intelligence methods for SCADA security","volume":"11","author":"Yal\u00e7\u0131n","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2947","DOI":"10.1007\/s10586-023-04028-4","article-title":"A novel method to detect cyber-attacks in IoT\/IIoT devices on the Modbus protocol using deep learning","volume":"26","author":"Gueye","year":"2023","journal-title":"Clust Comput"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2442","DOI":"10.1109\/TNSM.2023.3299606","article-title":"Federated learning inspired low-complexity intrusion detection and classification technique for SDN-based industrial CPS","volume":"20","author":"Zainudin","year":"2023","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"26608","DOI":"10.1109\/ACCESS.2025.3538461","article-title":"Intrusion detection and prevention system (IDPS) model for IIoT environments using hybridized framework","volume":"13","author":"Srinivasan","year":"2025","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"12502","DOI":"10.1109\/ACCESS.2025.3530902","article-title":"Machine learning-based detection of anomalies, intrusions and threats in industrial control systems","volume":"13","author":"Benka","year":"2025","journal-title":"IEEE Access"},{"key":"ref15","first-page":"1","article-title":"Evolutionary adversarial autoencoder for unsupervised anomaly detection of Industrial Internet of Things","author":"Zeng","year":"2025","journal-title":"IEEE Trans Reliab"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"23083","DOI":"10.1007\/s11042-023-16395-6","article-title":"Review on intrusion detection system for IoT\/IIoT-brief study","volume":"83","author":"Bansal","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"151444","DOI":"10.1109\/ACCESS.2024.3477415","article-title":"Intrusion detection in industrial control systems based on deep reinforcement learning","volume":"12","author":"Sangoleye","year":"2024","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1134\/S0361768823040126","article-title":"Detection of network attacks in a heterogeneous industrial network based on machine learning","volume":"49","author":"Vulfin","year":"2023","journal-title":"Program Comput Softw"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"6955","DOI":"10.1007\/s00521-024-09439-x","article-title":"Comparative study of ML models for IIoT intrusion detection: impact of data preprocessing and balancing","volume":"36","author":"Eid","year":"2024","journal-title":"Neural Comput Appl"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"107515","DOI":"10.1016\/j.engappai.2023.107515","article-title":"Towards a generalized hybrid deep learning model with optimized hyperparameters for malicious traffic detection in the Industrial Internet of Things","volume":"128","author":"Babayigit","year":"2024","journal-title":"Eng Appl Artif Intell"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_64728\/TSP_CMC_64728.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:03:15Z","timestamp":1763344995000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064728","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-21","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}